EU RM Toolbox Library 02 - Assets Mappings
EU RM Toolbox Library 02 - Assets Mappings
Definition
Subcategories/Examples
1.ISO/IEC 27005:2018
Definition
Primary assets are usually the core processes and information of the activity in scope.
Other primary assets such as the organisation's processes can also be considered,
which are more appropriate for drawing up an information security policy or a business
continuity plan.
Sites comprises all the places containing the scope or part of the scope, and the
physical
means required for it to operate.
The organisation type describes the organisational framework, consisting of all the
personnel structures assigned to a task and the procedures controlling these
structures.
-
1.ISO/IEC 27005:2018
Subcategories/Examples
For example:
— processes whose loss or degradation make it impossible to carry out the mission of the
organisation;
— processes that contain secret processes or processes involving proprietary technology;
— processes that, if modified, can greatly affect the accomplishment of the organisation's
mission;
— processes that are necessary for the organisation to comply with the applicable
contractual, legal or regulatory requirements identified as per Clause 6;
-
— Data processing equipment (active): Automatic information processing equipment
including the items required to operate independently.
— Transportable equipment: Portable computer equipment.
EXAMPLE Laptop computer, Personal Digital Assistant (PDA).
— Fixed equipment: Computer equipment used on the organisation's premises.
EXAMPLE Server, microcomputer used as a workstation.
— Processing peripherals: Equipment connected to a computer via a communication port
(serial, parallel link, etc.) for entering, conveying or transmitting data.
EXAMPLE Printer, removable disc drive.
— Data medium (passive): These are media for storing data or functions.
— Electronic medium: An information medium that can be connected to a computer or
computer network for data storage. Despite their compact size, these media can contain a
large amount of data. They can be used with standard computing equipment.
EXAMPLE Floppy disc, CD ROM, back-up cartridge, removable hard disc, memory key,
tape.
— Other media: Static, non-electronic media containing data.
EXAMPLE Paper, slide, transparency, documentation, fax.
— Operating system: This includes all the programmes of a computer making up the
operational base from which all the other programmes (services or applications) are run. It
includes a kernel and basic functions or services. Depending on the architecture, an
operating system may be monolithic or made up of a micro-kernel and a set of system
services. The main elements of the operating system are all the equipment management
services (CPU, memory, disc, and network interfaces), task or process management
services and user rights management services.
— Service, maintenance or administration software: Software characterized by the fact
that it complements the operating system services and is not directly at the service of the
users or applications (even though it is usually essential or even indispensable for the global
operation of the information system).
— Package software or standard software: Standard software or package software are
complete products commercialized as such (rather than one-off or specific developments)
with medium, release and maintenance. They provide services for users and applications,
but are not personalized or specific in the way that business applications are.
EXAMPLE Data base management software, electronic messaging software, groupware,
directory software, web server software, etc.
— Business application:
1. Standard business application: This is commercial software designed to give users
direct access to the services and functions they require from their information system in their
professional context. There is a very wide, theoretically limitless, range of fields.
EXAMPLE Accounts software, machine tool control software, customer care software,
personnel competency management software, administrative software, etc.
2.Specific business application: This is software in which various aspects (primarily
support, maintenance, upgrading, etc.) have been specifically developed to give users direct
access to the services and functions they require from their information system. There is a
very wide, theoretically unlimited, range of fields.
EXAMPLE Invoice management of telecom operators' customers, real time monitoring
application for rocket launching.
— Decision-maker: Decision-makers are the owners of the primary assets (information and
functions) and the managers of the organisation or specific project.
EXAMPLE Top management, project leader.
— Users: Users are the personnel who handle sensitive elements in the context of their
activity and who have a special responsibility in this respect. They can have special access
rights to the information system to carry out their everyday tasks.
EXAMPLE Human resources management, financial management, risk manager.
— Operation/maintenance staff: These are the personnel in charge of operating and
maintaining the information system. They have special access rights to the information
system to carry out their everyday tasks.
EXAMPLE System administrator, data administrator, back-up, Help Desk, application
deployment operator, security officers.
— Developers: Developers are in charge of developing the organisation's applications. They
have access to part of the information system with high-level rights but do not take any
action on the production data.
EXAMPLE Business application developers.
— Location:
— External environment: This concerns all locations in which the organisation's means of
security cannot be applied.
EXAMPLE Homes of the personnel, premises of another organisation, environment outside
the site (urban area, hazard area).
— Premises: This place is bounded by the organisation's perimeter directly in contact with
the outside. This can be a physical protective boundary obtained by creating physical
barriers or means of surveillance around buildings.
EXAMPLE Establishment, buildings.
— Zone: A zone is formed by a physical protective boundary forming partitions within the
organisation's premises. It is obtained by creating physical barriers around the organisation's
information processing infrastructures.
EXAMPLE Offices, reserved access zone, secure zone.
— Essential services: All the services required for the organisation's equipment to operate.
— Communication: Telecommunications services and equipment provided by an operator.
EXAMPLE Telephone line, PABX, internal telephone networks.
— Utilities:
— Services and means (sources and wiring) required for providing power to information
technology equipment and peripherals.
EXAMPLE Low-voltage power supply, inverter, electrical circuit head-end.
— Water supply
— Waste disposal
— Services and means (equipment, control) for cooling and purifying the air.
EXAMPLE Chilled water pipes, air-conditioners.
— Authorities: These are organisations from which the studied organisation derives its
authority. They can be legally affiliated or external. This imposes constraints on the studied
organisation in terms of regulations, decisions and actions.
EXAMPLE Administrating body, Head office of an organisation.
— Structure of the organisation: This consists of the various branches of the organisation,
including its cross-functional activities, under the control of its management.
EXAMPLE Human resources management, IT management, purchasing management,
business unit management, building safety service, fire service, audit management.
— Project or system organisation: This concerns the organisation set up for a specific project
or service.
EXAMPLE New application development project, information system migration project.
— Subcontractors/suppliers/manufacturers: These are organisations that provide the
organisation with a service or resources and bound to it by contract.
EXAMPLE Facilities management company, outsourcing company, consultancy companies.
-
2.IT Security Risk Mana
Definition
Data Sets or Data (for short) managed by the Target System and the Functions provided by it.
Functions:
The processing of information comprises all functions of a CIS with regard to Data Sets, including creation
storage, transmission, deletion and archiving of information. Processing of information can be provided by
functionalities to users and as IT services to other CIS.
Asset used or involved in the processing of the Data and Functions provided by the
Target System. Hardware, software, personnel, locations and services are the main
supporting assets that build an IT System. Supporting Assets are also known as
Secondary Assets or IT Assets.
Physical elements part of the Target System used for the processing, transmission and storage of primary
Programmes and applications of the target system related to the processing, transmission and storage of p
People and roles that use the target system or are involved in the processing, transmission and storage of
Infrastructures, offices and other premises related to the geographical location of the hardware and softwa
-
A service is a means of delivering data processing (Data Sets and Functions) to customers, internally or ex
up of a combination of Information Technology products (hardware and software), people and locations. A
Supporting Asset of type “Service” which is itself made of a sub-set of Supporting Assets.
ogy v1.2
Subcategories/Examples
Examples of Data are user databases, payroll files, strategic plans, growth
forecasts, Commission or system documentation, contracts, user manuals,
training material, operational or support procedures, guidelines, documents
containing important results of the Commission’s business, continuity plans, or
fall-back arrangements.
1. End-point:
-Portable : Laptop, netbook, tablet, smartphone, smartcard, token,...
-Fixed:Desktop, workstation,...
2.Server: Multi-purpose Device (networked printer/copier/scanner with
storage),SAN,NAS,backup/storage robot,...
2.Network node:
-router, switch, bridge, gateway, hub, repeater, modem, Wifi Access Point
3.Network media:
-Wired:Copper cable, coaxial cable, twisted pair, optical fiber, …
-Wireless:Wifi, 801.11, Bluetooth, IR, Radio, satellite …
4.Data media:
-Digital:Hard-disk, floppy-disk, CD, DVD, USB device, tapes, cartridge, memory
card,
-Non-Digital:Paper, (micro)film, slides, …
5.Peripherals:Printing equipment, reader/writer equipment, scanning
equipment, keyboard, mouse, console, screen, …
1.Firmware: BIOS,...
2.Middleware:
-Web Browser
-Web Server:Tomcat
-Application Server:PHP server, net server mobile application server, J2EE,
WebSphere Application Server (WAS)
-DB Server
-Network Stack: Open SSL, TCP IP
-Operating Systems:Windows,Mac OS,Linux
-Hypervisor: Virtualization Layer
3.End-user Application/Module:N/A
.Normal Users, Priviledged users, Service providers, System suppliers
1.Data Center:
-Hosting:N/A
-Housing:N/A
2.Network services : Internet, LAN, MAN, WAN, Wifi, ADSL, X.25, ISDN, …
3.Cloud Services:
-IaaS (Infrastructure as a Service)
-SaaS (Software as a Service)
-PaaS (Platform as a Service)